TECHNOLOGY > > Resilience


« Back to News

2023-09-18

Dealing With Security Incidents In The Enterprise Sector 

Data Security Is The Top Priority: There are important steps businesses can take to combat ransomware & other malware attacks By Dirk Schrader

2023-09-08

Red Teaming Is More Relevant Than Ever

Make Cyber Security Relevant: Unlike a penetration test, red teaming employs real-world tactics, techniques & procedures. By Phil Robinson

2023-09-29

Critical Cyber Security Tips For Home & Family

Five Step Program: Your home and family have never been more vulnerable to cyber crime and it's vital to take some basic protective measures.

2023-09-06

Establishing A Digital Immune System

Creating The Self-Healing Enterprise With DIS: Why immunity should be your new favourite cybersecurity metaphor. By Matt Tuson

2023-09-04

How To Combat Cyber Security Burnout

Burnout Syndrome Is Real: Stop this happening to your cyber security team by automating and consolidating technologies. By Diana Harter

2023-09-01

Navigating User Experience, Performance & Security

Striking The Balance: Are great user experience and stringent security protocols compatible with a well-performing website? By Gav Winter

2023-08-29

Reimagining Your Cyber Infrastructure

From Security To Resiliency: Organisations should focus on reducing the chances of a breach by reducing their attack surface. By Duncan Bradley

2023-08-22

How To Check Out Suppliers Before You Commit

Supply Chain Risk: It's now possible to execute automatic searches of a supplier’s digital presence without needing consent. By Abdullah Mirza

2023-08-19

How SMEs Can Achieve Cyber Resilience

For big businesses the consequence of a cyber attack can be very costly. For smaller organisations, they can be devastating. By Tom Egglestone

2023-08-16

Staying Ahead Of Cyberthreats

Best Cybersecurity Practices For Businesses Of All Sizes: In the digital world cybersecurity is no longer an option for businesses, but a necessity.

2023-08-14

Understanding Malvertising Attacks

Lack of awareness, plus easier access to AI tools, provides the perfect cocktail for even inexperienced threat actors to exploit. By Tom McVey

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

CyberESI

CyberESI

CyberESI is a Managed Security Service Provider providing 24x7 remote security monitoring and management of your mission-critical networks.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Persona Identities

Persona Identities

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.

Equixly

Equixly

Equixly is revolutionizing application security by empowering developers and organizations to build more secure software, elevate their security posture, and stay ahead of emerging threats.